User Administration Procedure

User Administration Procedure

The User Administration Procedure has been designed to provide a unified guideline for creating, modifying or deleting user accounts from Company business systems. It provides guidelines to be followed for creating a user account, modifying access rights for a user account, reviewing active user accounts defined for each system and removing unnecessary user accounts.

Specific user administration procedures, detailing all the steps to be performed for user administration, must be developed by the information system custodian for each system and must be approved by the information system owner.

CONTENT

1. OVERVIEW
1.1 PROCEDURE OWNER
1.2 CLASSIFICATION
1.3 APPLICABLE REGULATIONS
1.4 RELATED [COMPANY] NORMS AND PROCEDURES
1.5 OBJECTIVES
1.6 AUDIENCE AND SCOPE
1.7 DOCUMENT SUPPORT
2. DEFINITIONS & ABBREVIATIONS
3. REQUIREMENTS FOR USER ADMINISTRATION
3.1 CREATING USER ACCOUNTS
3.2 MODIFYING ACCESS RIGHTS
3.3 REMOVING ACCESS RIGHTS
3.4 REVIEW OF USER ACCESS RIGHTS
3.5 PRIVILEGE MANAGEMENT
4. RESPONSIBILITIES
4.1 DEPARTMENT MANAGER
4.2 TECHNOLOGY SECURITY TEAM
4.3 SYSTEM OWNER
4.4 EMPLOYEE
5. EXCEPTIONS
6. FINAL CONSIDERATIONS
6.1 DISCIPLINARY ACTIONS AGAINST PROCEDURE VIOLATION
6.2 DOCUMENT REVISION

Pages: 10

 

Review User Administration Procedure.

Your email address will not be published. Required fields are marked *

Related Products:

€559.99

Purchase

This bundle contains all the products listed in the Identity and Access Management section. Take advantage of the 25% OFF when buying the bundle!

€49.99

Purchase

The techniques of dual control and segregation of duties have to be implemented to enhance the control over activities wherever the risk and impact of an IT Security incident would likely result in financial or other material damage to the organization.

€49.99

Purchase

The objective of this procedure is to ensure the security of Company’s assets. Effective security controls in relation to access the data are an essential component of the effective risk management of Company's data resource.

Get  Your Free Sample

Please use the form below to subscribe to our list and receive a free procedure template!
GET YOUR FREE TEMPLATE
>
close-link